Shibboleth Identity Provider (IdP) Sebastian Rieger
|
|
|
- Clyde Foster
- 10 years ago
- Views:
Transcription
1 Shibboleth Identity Provider (IdP) Sebastian Rieger Gesellschaft für wissenschaftliche Datenverarbeitung mbh Göttingen, Germany CLARIN AAI Hands On Workshop, , Oxford eresearch Center
2 Integrating your local identities in federations setting up your own IdP allows your users to access services (SPs) in federations and to cooperate with other institutions the IdP reflects the home organization of your users in the federation, it ensures proper authentication (username, password) and authorization, credentials and sensitive data are stored in the institute (not at the SPs) on successfull authentication the IdP issues a digitally signed assertion (token, ticket), that authenticates the user a reference to the assertion is stored as a Cookie (HTTP session) in the user s web browser by redirecting the client to the IdP (using HTTP redirect or POST), while accessing another SP, assertion (Cookie) is used to authenticate the user without further logins Single Sign-On is achieved as long as assertion is valid CLARIN AAI Shibboleth Workshop 2
3 Architecture of a Shib IdP Shibboleth IdP is a Java Web Application, Download JDK 1.6 preferred, installation script (install.sh) Java Security Provider and Tomcat configuration platform independent Linux, Windows Documentation: Basic Components: Web Server (Apache e.g. 2.2) Application Server (Tomcat e.g. 5.5) IdP is deployed in idp.war (current version 2.1.2) AuthN: SSOHandler used for authentication: HTTP, form-based or existing session / assertion (Cookie), certificates in development, using AuthN DB or LDAP, custom implementations possible (JAAS) AuthZ:Attribute Authority allowing AuthZ using attributes, using Attribute DB, LDAP,... Source: CLARIN AAI Shibboleth Workshop 3
4 Configuring Apache and Tomcat setting up a virtual host in Apache, passing access to local Tomcat using certificate and keyfile of the IdP /etc/apache2/conf.d/idp.conf: <VirtualHost :443> ServerName my-new-idp.example.com:443 SSLEngine on SSLCertificateFile /opt/shibboleth-idp/credentials/idp.crt SSLCertificateKeyFile /opt/shibboleth-idp/credentials/idp.key <Proxy ajp://localhost:8009/idp/*> Allow from all </Proxy> ProxyPass /idp/ ajp://localhost:8009/idp/ </VirtualHost> Listen 8443 <VirtualHost :8443> ServerName my-new-idp.example.com:8443 SSLEngine on SSLCertificateFile /opt/shibboleth-idp/credentials/idp.crt SSLCertificateKeyFile /opt/shibboleth-idp/credentials/idp.key <Location /idp>allow from all SSLOptions +StdEnvVars +ExportCertData SSLVerifyClient optional_no_ca SSLVerifyDepth 10 </Location> <Proxy ajp://localhost:8009/idp/*> Allow from all </Proxy> ProxyPass /idp/ ajp://localhost:8009/idp/ </VirtualHost> CLARIN AAI Shibboleth Workshop 4
5 Configuring Apache and Tomcat setting up the Tomcat to deploy the idp.war remember to reserve enough Java heap (using Xmx, -Xms) (e.g. /etc/default/tomcat5.5) server.xml <Server port="8005" shutdown="shutdown"> <!-- Define the Tomcat Stand-Alone Service --> <Service name="catalina"> <!-- Define an AJP 1.3 Connector on port > <Connector port="8009" address=" " request.tomcatauthentication="false" enablelookups="false" redirectport="8443" protocol="ajp/1.3" /> </Service> </Server> /etc/tomcat5.5/catalina/localhost/idp.xml <Context docbase="/opt/shibboleth-idp/war/idp.war" privileged="true" antiresourcelocking="false" antijarlocking="false" unpackwar="false" /> CLARIN AAI Shibboleth Workshop 5
6 a Shib 2.0 session initialization in detail Demo showing each HTTP request / response Source: CLARIN AAI Shibboleth Workshop 6
7 Connecting the IdP to Identity Management IdP can use a directory service (LDAP, AD, ), database, custom connectors Attribute Resolver and AuthN engine can use separate configurations two integration types for AuthN: external (web server, or tomcat realm) and internal (formbased auth using Shibboleth) Example: internal Shib-based AuthN via LDAP (login.config) ShibUserPassAuth { edu.vt.middleware.ldap.jaas.ldaploginmodule sufficient host= ldap.gwdg.de" port="636" base= dc=gwdg,dc=de" ssl="true" userfield="uid" subtreesearch="true"; }; // alternate Kerberos config ShibUserPassAuth { com.sun.security.auth.module.krb5loginmodule sufficient; }; failover config possible by inserting more sufficient configurations (fall-through) CLARIN AAI Shibboleth Workshop 7
8 Connecting the IdP to Identity Management Configuring AuthN handler in handler.xml <!-- Shib internal Username/password login handler --> <LoginHandler xsi:type="usernamepassword jaasconfigurationlocation= file:///opt/shibidp/conf/login.config > <AuthenticationMethod>urn:oasis:names:tc:SAML:2.0:ac:classes:PasswordProtectedTransport </AuthenticationMethod> </LoginHandler> <! alternate handler for external AuthN e.g. Tomcat using HTTP REMOTE_USER header --> <LoginHandler xsi:type="remoteuser"> <AuthenticationMethod>urn:oasis:names:tc:SAML:2.0:ac:classes:unspecified </AuthenticationMethod> </LoginHandler> failover for IdP possible by using Load Balancing (Layer 3), Cost: no SSO after failover Session-aware Load Balancing (Layer 7) supported since IdP 2.1 using terracotta ( network attached memory to provide persistent clustered heap, see tc-config.xml) other services (besides SAML-based profiles) defined in the handler.xml: Status (display the status of the IdP) e.g. Metdata (retrieve metadata from IdP) e.g. Login Handler PreviousSession to allow SSO CLARIN AAI Shibboleth Workshop 8
9 Joining federations with your IdP Federations / trusts can be assigned in relying-party.xml multiple federations can be assigned definition of the IdP entity and certificate & private key used for digital signatures <DefaultRelyingParty provider=" defaultsigningcredentialref="idpcredential"> Publish service URLs (profiles) of the IdP - SSO (AuthN) - AttributeQuery (handling requests for attributes to do AuthZ) - ArtifactResolution (requesting an assertion using an Artifact e.g. POST profile) - all handlers are offered for SAML 2.0 and SAML 1.1 to ensure interoperability with Shibboleth 1.1 (by the way end of life 6/30/2010!) automatic download and caching of the metadata of the assigned federations CLARIN AAI Shibboleth Workshop 9
10 Joining federations with your IdP cont. Configuring integration of metadata in relying-party.xml (e.g. trusted SPs) // get metadata.xml from URL, cache it localy, check signature // and ignore parties not being SPs <MetadataProvider id="urlmd" xsi:type="filebackedhttpmetadataprovider" xmlns="urn:mace:shibboleth:2.0:metadata" metadataurl=" backingfile="/opt/shibboleth-idp/metadata/dfn-aai-test-metadata-backingfile.xml"> <MetadataFilter xsi:type="chainingfilter" xmlns="urn:mace:shibboleth:2.0:metadata"> <MetadataFilter xsi:type="signaturevalidation" xmlns="urn:mace:shibboleth:2.0:metadata" trustengineref="shibboleth.metadatatrustengine" requiresignedmetadata="true" /> <MetadataFilter xsi:type="entityrolewhitelist" xmlns="urn:mace:shibboleth:2.0:metadata"> <RetainedRole>samlmd:SPSSODescriptor</RetainedRole> </MetadataFilter> </MetadataFilter> </MetadataProvider> // security trust engine to check metadata signature as configured in the filter <security:trustengine id="shibboleth.metadatatrustengine" xsi:type="security:staticexplicitkeysignature"> <security:credential id="myfederation1credentials" xsi:type="security:x509filesystem"> <security:certificate>/opt/shibboleth-idp/credentials/dfnaai.pem</security:certificate> </security:credential> </security:trustengine> CLARIN AAI Shibboleth Workshop 10
11 Multiple Federations joining multiple federations can be accomplished in several ways registering the IdP in multiple federations and configure them in relying-party.xml usage of bridging protocols (e.g. edugain) building a confederation for MPG-AAI we developed an IdP Proxy that is placed in multiple federations and allows different authentication mechanisms Implementation as custom JAAS module (external Tomcat AuthN), custom data connector users select the single IdP Proxy in the Discovery Service and use their local identities (and IdPs), to log in using their mail address, IdP is derived from the domain / realm attributes going to external federations can be filtered only one IdP for the entire MPG in the external DS Institut A IdP Institut C Institut A IdP MPG-AAI Option b) LDAP Option a) Shibboleth Max-Planck-Gesellschaft IdP Proxy DFN-AAI CLARIN AAI LDAP Shibboleth Workshop bei der GWDG11 Ovid SP Option c) GWDG Elsevier SP EBSCO SP IDM Out-Sourcing
12 X.509 certificates & Java The Basics the installation script of the IdP creates a keypair, this can be used for further requests root@idp:/opt/shibboleth-idp/credentials# openssl req -new -key idp.key -out idp.csr resulting CSR can be sent to your NREN CA, issued certificate is copied to idp.crt path to files is configured in relying-party.xml and the virtual host, containing your IdP e.g.: Listen 8443 <VirtualHost :8443> ServerName idp.example.com:8443 SSLEngine on SSLCertificateFile /opt/shibboleth-idp/credentials/idp.crt SSLCertificateKeyFile /opt/shibboleth-idp/credentials/idp.key <Location /idp> Allow from all </Location> <Proxy ajp://localhost:8009/idp/*> Allow from all </Proxy> ProxyPass /idp/ ajp://localhost:8009/idp/ </VirtualHost> Java keystore IdP.jks can be deleted, or you can import cert and key using keytool CLARIN AAI Shibboleth Workshop 12
13 Interaction with SPs IdP delivers assertions and attributes to SPs, Shibboleth allows a finegrained filtering of the outgoing attributes attributes are based on standards: inetorgperson, eduperson, dfneduperson e.g. edupersonaffiliation, edupersontargetedid, edupersonentitlement Attribute management at the IdP is split into two instances: Resolver and Filter Resolver gets attributes from directory services, databases etc. (attribute-resolver.xml) attributes are converted and mapped e.g. to URN (e.g. urn:geant:dfn.de:mpg: ) combining multiple attribute (sources), and complex formatting are possible Filter defines Attribute Release Policy (ARP) for consuming SPs / federations (attribute-filter.xml) filtering can be configured individually for every SP / federation the IdP knows complex filter scenarios are possible (filtering specific values, defining filter rules) CLARIN AAI Shibboleth Workshop 13
14 Attribute Resolver first data connectors are defined as sources for the attributes in attribute-resolver.xml <!-- Example Static Connector --> <resolver:dataconnector id="staticattributes" xsi:type="static" xmlns="urn:mace:shibboleth:2.0:resolver:dc"> <Attribute id="edupersonaffiliation"><value>member</value></attribute> <Attribute id="edupersonentitlement"> <Value>urn:mace:dir:entitlement:common-lib-terms</Value> </Attribute> </resolver:dataconnector> <!-- Example LDAP Connector --> <resolver:dataconnector id="myldap" xsi:type="ldapdirectory xmlns="urn:mace:shibboleth:2.0:resolver:dc" ldapurl="ldaps://ldap.gwdg.de" basedn="o=goestern" principal="cn=roadmin,o=gwdg principalcredential="secret"> <FilterTemplate> <![CDATA[ ]]> (uid=$requestcontext.principalname) </FilterTemplate> </resolver:dataconnector> failover LDAP servers possible by separating different URLs with a blank CLARIN AAI Shibboleth Workshop 14
15 Attribute Resolver cont. <!-- Example Relational Database Connector --> <resolver:dataconnector id="mydb" xsi:type="relationaldatabase" xmlns="urn:mace:shibboleth:2.0:resolver:dc"> <ApplicationManagedConnection jdbcdriver="oracle.jdbc.driver.oracledriver" jdbcusername="myid" jdbcpassword="mypassword" /> <QueryTemplate> <![CDATA[ ]]> </QueryTemplate> SELECT * FROM student WHERE gzbtpid = $requestcontext.principalname <Column columnname="gzbtpid" attributeid="uid" /> <Column columnname="fqlft" attributeid="gpa" type="float" /> </resolver:dataconnector> <!-- StoredID (persistentid) Connector e.g. to generate edupersontargetedid --> <resolver:dataconnector id="mystoredid" xsi:type="storedid" xmlns="urn:mace:shibboleth:2.0:resolver:dc" generatedattributeid="persistentid" sourceattributeid="uniqueid" salt="some/secret"> <resolver:dependency ref="uniqueid" /> <ApplicationManagedConnection jdbcdriver="com.mysql.jdbc.driver" jdbcurl="jdbc:mysql://localhost:3306/shibboleth?autoreconnect=true" jdbcusername= user" jdbcpassword= secret" /> </resolver:dataconnector> CLARIN AAI Shibboleth Workshop 15
16 Attribute Resolver cont. the attributes from the data connectors have to be mapped to SAML attributes <resolver:attributedefinition id="edupersonaffiliation" xsi:type="simple" xmlns="urn:mace:shibboleth:2.0:resolver:ad" sourceattributeid="edupersonaffiliation"> <resolver:dependency ref="staticattributes" /> <resolver:dependency ref="myldap" /> <resolver:attributeencoder xsi:type="saml1string xmlns="urn:mace:shibboleth:2.0:attribute:encoder name="urn:mace:dir:attribute-def:edupersonaffiliation" /> <resolver:attributeencoder xsi:type="saml2string" xmlns="urn:mace:shibboleth:2.0:attribute:encoder name="urn:oid: " friendlyname="edupersonaffiliation" /> </resolver:attributedefinition> <resolver:attributedefinition id="edupersonentitlementovid" xsi:type="template" xmlns="urn:mace:shibboleth:2.0:resolver:ad"> <resolver:dependency ref="idpproxydataconnector" /> <resolver:attributeencoder xsi:type="saml1string" xmlns="urn:mace:shibboleth:2.0:attribute:encoder name="urn:mace:dir:attribute-def:edupersonentitlement" /> <resolver:attributeencoder xsi:type="saml2string" xmlns="urn:mace:shibboleth:2.0:attribute:encoder name="urn:oid: " friendlyname="edupersonentitlement" /> <Template><![CDATA[urn:wkhmr:ovid.institutional.login:${uid}]]></Template> <SourceAttribute>uid</SourceAttribute> </resolver:attributedefinition> other complex attribute types are possible, several depencies can be defined (e.g. for failover) CLARIN AAI Shibboleth Workshop 16
17 Attribute Filter filters defined in attribute-filter.xml - deny attributes and values for federations / SPs <AttributeFilterPolicy> <PolicyRequirementRule xsi:type="basic:or"> <basic:rule xsi:type="saml:attributerequesterinentitygroup" groupid="urn:mace:incommon" /> <basic:rule xsi:type="saml:attributerequesterinentitygroup groupid=" /> </PolicyRequirementRule> <AttributeRule attributeid="edupersonscopedaffiliation"> <PermitValueRule xsi:type="basic:any" /> </AttributeRule> <AttributeRule attributeid="edupersonaffiliation"> <PermitValueRule xsi:type="basic:or"> <basic:rule xsi:type="basic:attributevaluestring" value="faculty"/> <basic:rule xsi:type="basic:attributevaluestring" value="student"/> </PermitValueRule></AttributeRule> </AttributeFilterPolicy> <AttributeFilterPolicy> <PolicyRequirementRule xsi:type="basic:attributerequesterstring value=" /> <AttributeRule attributeid="edupersonentitlementovid"> <PermitValueRule xsi:type="basic:any" /></AttributeRule> </AttributeFilterPolicy> CLARIN AAI Shibboleth Workshop 17
18 Ensuring privacy You can use aacli.sh to check which attributes are delivered by the IdP Filtering attributes and their values is not enough to ensure privacy, personal data belonging to the user is maybe not be allowed to leak from the institute but SPs need at least an attribute to differentiate between users solution is to deliver anonymized id for the user edupersontargetedid persistent id being a hash over username + idp secret + sp name, irreversible, users get different ids for different SPs (service publishers can not track the users) for other attributes containing personal data, users can get the possibility to explicitly approve attributes being sent: SWITCHaai uapprove Users will need to accept terms of use and confirm the sending of attributes to every SP they use, reconfirmation is needed if policy, or the set of delivered attributes changes Demo: using Ovid service in the MPG-AAI CLARIN AAI Shibboleth Workshop 18
19 Customizing idp login etc. login page can be customized in the IdP sources see src/main/webapp/login.jsp also login-error.jsp (e.g. for failed authentication) can be customized error.jsp, error404.jsp (failures during usage of the profiles and handlers) changes can be deployed by using install.sh again (builds the WAR and deploys it) CLARIN AAI Shibboleth Workshop 19
20 Logging Shibboleth IdP logging is configured in logging.xml accesses are logged to /opt/shibboleth-idp-2.0.0/logs/idp-access.log and /opt/shibboleth-idp-2.0.0/logs/idp-audit.log debugging information can be taken from /opt/shibboleth-idp-2.0.0/logs/idp-process.log <!-- Logs IdP, but not OpenSAML, messages --> <logger name="edu.internet2.middleware.shibboleth"> <level value="debug" /> </logger> <!-- Logs OpenSAML, but not IdP, messages --> <logger name="org.opensaml"> <level value="debug" /> </logger> <!-- Logs LDAP related messages --> <logger name="edu.vt.middleware.ldap"> <level value="debug"/> </logger> consider privacy of logged information! Demo CLARIN AAI Shibboleth Workshop 20
21 Outlook: IdP in Shibboleth 2.x Shib IdP 2.2 Single Logout functionality (SAML-conform SLO, partly already implemented) ECP profile of SAML 2.0 (Enhanced Client or Proxy / Delegation e.g. SOAP, ) X.509 and other authentication mechanisms (Kerberos, SPNEGO, ADFS etc. currently available using plug-ins) native support for privacy enhancements like uapprove integration of user-centric Identity Management (CardSpace, OpenID)? maybe support for desktop applications? e.g. using ECP? Thanks for your attention! any questions? CLARIN AAI Shibboleth Workshop 21
Running Multiple Shibboleth IdP Instances on a Single Host
CESNET Technical Report 6/2013 Running Multiple Shibboleth IdP Instances on a Single Host IVAN NOVAKOV Received 10.12.2013 Abstract The article describes a way how multiple Shibboleth IdP instances may
WebNow Single Sign-On Solutions
WebNow Single Sign-On Solutions Technical Guide ImageNow Version: 6.7. x Written by: Product Documentation, R&D Date: June 2015 2012 Perceptive Software. All rights reserved CaptureNow, ImageNow, Interact,
Logout Support on SP and Application
Logout Support on SP and application Logout Support on SP and Application Possibilities and and Limitations SWITCHaai Team [email protected] Single Logout: Is it possible? Single Logout will work only in some
Implementation Guide SAP NetWeaver Identity Management Identity Provider
Implementation Guide SAP NetWeaver Identity Management Identity Provider Target Audience Technology Consultants System Administrators PUBLIC Document version: 1.10 2011-07-18 Document History CAUTION Before
Perceptive Experience Single Sign-On Solutions
Perceptive Experience Single Sign-On Solutions Technical Guide Version: 2.x Written by: Product Knowledge, R&D Date: January 2016 2016 Lexmark International Technology, S.A. All rights reserved. Lexmark
TIBCO Spotfire Platform IT Brief
Platform IT Brief This IT brief outlines features of the system: Communication security, load balancing and failover, authentication options, and recommended practices for licenses and access. It primarily
Authentication Methods
Authentication Methods Overview In addition to the OU Campus-managed authentication system, OU Campus supports LDAP, CAS, and Shibboleth authentication methods. LDAP users can be configured through the
AAI for Mobile Apps How mobile Apps can use SAML Authentication and Attributes. Lukas Hämmerle [email protected]
AAI for Mobile Apps How mobile Apps can use SAML Authentication and Attributes Lukas Hämmerle [email protected] Berne, 13. August 2014 Introduction App by University of St. Gallen Universities
Title: A Client Middleware for Token-Based Unified Single Sign On to edugain
Title: A Client Middleware for Token-Based Unified Single Sign On to edugain Sascha Neinert Computing Centre University of Stuttgart, Allmandring 30a, 70550 Stuttgart, Germany e-mail: [email protected]
AA enabling a closed source legacy application
AA enabling a closed source legacy application Jan Du Caju ICT security officer K.U.Leuven Belgium AA enabling a closed source legacy application Introduction: context association K.U.Leuven Case: AA enabling
About Me. #ccceu. @shapeblue. Software Architect with ShapeBlue Specialise in. 3 rd party integrations and features in CloudStack
Software Architect with ShapeBlue Specialise in. 3 rd party integrations and features in CloudStack About Me KVM, API, DB, Upgrades, SystemVM, Build system, various subsystems Contributor and Committer
External and Federated Identities on the Web
External and Federated Identities on the Web Jan Pazdziora Sr. Principal Software Engineer Identity Management Special Projects, Red Hat 1 st October 2015 Scope and problem statement Applications get deployed
Agenda. How to configure
[email protected] Agenda Strongly Recommend: Knowledge of ArcGIS Server and Portal for ArcGIS Security in the context of ArcGIS Server/Portal for ArcGIS Access Authentication Authorization: securing web services
CERTIFICATE-BASED SINGLE SIGN-ON FOR EMC MY DOCUMENTUM FOR MICROSOFT OUTLOOK USING CA SITEMINDER
White Paper CERTIFICATE-BASED SINGLE SIGN-ON FOR EMC MY DOCUMENTUM FOR MICROSOFT OUTLOOK USING CA SITEMINDER Abstract This white paper explains the process of integrating CA SiteMinder with My Documentum
Computer Systems Security 2013/2014. Single Sign-On. Bruno Maia [email protected]. Pedro Borges [email protected]
Computer Systems Security 2013/2014 Single Sign-On Bruno Maia [email protected] Pedro Borges [email protected] December 13, 2013 Contents 1 Introduction 2 2 Explanation of SSO systems 2 2.1 OpenID.................................
Identity Management in Liferay Overview and Best Practices. Liferay Portal 6.0 EE
Identity Management in Liferay Overview and Best Practices Liferay Portal 6.0 EE Table of Contents Introduction... 1 IDENTITY MANAGEMENT HYGIENE... 1 Where Liferay Fits In... 2 How Liferay Authentication
This chapter describes how to use the Junos Pulse Secure Access Service in a SAML single sign-on deployment. It includes the following sections:
CHAPTER 1 SAML Single Sign-On This chapter describes how to use the Junos Pulse Secure Access Service in a SAML single sign-on deployment. It includes the following sections: Junos Pulse Secure Access
Masdar Institute Single Sign-On: Standards-based Identity Federation. John Mikhael ICT Department [email protected]
Masdar Institute Single Sign-On: Standards-based Identity Federation John Mikhael ICT Department [email protected] Agenda The case for Single Sign-On (SSO) Types of SSO Standards-based Identity Federation
Web Services Security: OpenSSO and Access Management for SOA. Sang Shin Java Technology Evangelist Sun Microsystems, Inc. javapassion.
Web Services Security: OpenSSO and Access Management for SOA Sang Shin Java Technology Evangelist Sun Microsystems, Inc. javapassion.com 1 Agenda Need for Identity-based Web services security Single Sign-On
Step-by-Step guide for SSO from MS Sharepoint 2010 to SAP EP 7.0x
Step-by-Step guide for SSO from MS Sharepoint 2010 to SAP EP 7.0x Sverview Trust between SharePoint 2010 and ADFS 2.0 Use article Federated Collaboration with Shibboleth 2.0 and SharePoint 2010 Technologies
SAML-Based SSO Solution
About SAML SSO Solution, page 1 SAML-Based SSO Features, page 2 Basic Elements of a SAML SSO Solution, page 2 SAML SSO Web Browsers, page 3 Cisco Unified Communications Applications that Support SAML SSO,
Crawl Proxy Installation and Configuration Guide
Crawl Proxy Installation and Configuration Guide Google Enterprise EMEA Google Search Appliance is able to natively crawl secure content coming from multiple sources using for instance the following main
Identity Federation: Bridging the Identity Gap. Michael Koyfman, Senior Global Security Solutions Architect
Identity Federation: Bridging the Identity Gap Michael Koyfman, Senior Global Security Solutions Architect The Need for Federation 5 key patterns that drive Federation evolution - Mary E. Ruddy, Gartner
Authentication and Single Sign On
Contents 1. Introduction 2. Fronter Authentication 2.1 Passwords in Fronter 2.2 Secure Sockets Layer 2.3 Fronter remote authentication 3. External authentication through remote LDAP 3.1 Regular LDAP authentication
Federated Identity Management and Shibboleth. Noreen Hogan Asst. Director Enterprise Admin. Applications
Federated Identity Management and Shibboleth Noreen Hogan Asst. Director Enterprise Admin. Applications Federated Identity Management Management of digital identity/credentials (username/password) Access
Spring Security 3. rpafktl Pen source. intruders with this easy to follow practical guide. Secure your web applications against malicious
Spring Security 3 Secure your web applications against malicious intruders with this easy to follow practical guide Peter Mularien rpafktl Pen source cfb II nv.iv I I community experience distilled
PingFederate. Salesforce Connector. Quick Connection Guide. Version 4.1
PingFederate Salesforce Connector Version 4.1 Quick Connection Guide 2011 Ping Identity Corporation. All rights reserved. PingFederate Salesforce Quick Connection Guide Version 4.1 June, 2011 Ping Identity
Using Shibboleth for Single Sign- On
Using Shibboleth for Single Sign- On One Logon to Rule them all.. Kirk Yaros Director, Enterprise Services Mott Community College 1 Agenda Overview of Mott Overview of Shibboleth and Mott s Project Review
Integration of Shibboleth and (Web) Applications
workshop Integration of Shibboleth and (Web) Applications MPG-AAI Workshop Clarin Centers Prague 2009 2009-11-06 (Web) Application Protection Models Classical Application behind Shibboleth Standard Session
OIOSAML 2.0 Toolkits Test results May 2009
OIOSAML 2.0 Toolkits Test results May 2009 5. September 2008 - Søren Peter Nielsen: - Lifted and modified from http://docs.google.com/a/nemsso.info/doc?docid=dfxj3xww_7d9xdf7gz&hl=en by Joakim Recht 12.
DAMe Deploying Authorization Mechanisms for Federated Services in the eduroam Architecture
DAMe Deploying Authorization Mechanisms for Federated Services in the eduroam Architecture Sascha Neinert Marseille, 06.02.2008, Sascha Neinert, 06.02.2008 Seite 1 Overview Project Goals Partners Network
Enabling Federation and Web-Single Sign-On in Heterogeneous Landscapes with the Identity Provider and Security Token Service Supplied by SAP NetWeaver
Enabling Federation and Web-Single Sign-On in Heterogeneous Landscapes with the Identity Provider and Security Token Service Supplied by SAP NetWeaver SAP Product Management, SAP NetWeaver Identity Management
Flexible Identity Federation
Flexible Identity Federation Quick start guide version 1.0.1 Publication history Date Description Revision 2015.09.23 initial release 1.0.0 2015.12.11 minor updates 1.0.1 Copyright Orange Business Services
Setup Guide Access Manager 3.2 SP3
Setup Guide Access Manager 3.2 SP3 August 2014 www.netiq.com/documentation Legal Notice THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT ARE FURNISHED UNDER AND ARE SUBJECT TO THE TERMS OF A LICENSE
Разработка программного обеспечения промежуточного слоя. TERENA BASNET Workshop, 16-17 November 2009 Joost van Dijk - SURFnet
Разработка программного обеспечения промежуточного слоя TERENA BASNET Workshop, 16-17 November 2009 Joost van Dijk - SURFnet Contents - SURFnet Middleware Services department: - eduroam, SURFfederatie,
esoc SSA DC-I Part 1 - Single Sign-On and Access Management ICD
esoc European Space Operations Centre Robert-Bosch-Strasse 5 64293 Darmstadt Germany Tel: (49)615190-0 Fax: (49)615190485 www.esa.int SSA DC-I Part 1 - Single Sign-On and Access Management ICD Prepared
FERMILAB CENTRAL WEB HOSTING SINGLE SIGN ON (SSO) ON CWS LINUX WITH SAML AND MOD_AUTH_MELLON
FERMILAB CENTRAL WEB HOSTING SINGLE SIGN ON (SSO) ON CWS LINUX WITH SAML AND MOD_AUTH_MELLON Contents Information and Security Contacts:... 3 1. Introduction... 4 2. Installing Module... 4 3. Create Metadata
Shibboleth N-Tier Support. Chad La Joie [email protected]
Shibboleth N-Tier Support Chad La Joie [email protected] Agenda Use Case Terminology Shibboleth Solution Future Effort Resources 2 Use Case Current use case comes from University of Chicago University
Introducing Shibboleth
workshop Introducing Shibboleth MPG-AAI Workshop Clarin Centers Prague 2009 2009-11-06 MPG-AAI MPG-AAI a MPG-wide Authentication & Authorization Infrastructure for access control to web-based resources
Using Kerberos tickets for true Single Sign On
Using Kerberos tickets for true Single Sign On Table of Contents Introduction This document details the reasoning for, configuration of and experiences from the initial setup of Kerberos tickets for SSO
Shibboleth Configuration from 100,000 Feet, in 15 Minutes or Less! Steve Thorpe Systems Programmer / Analyst MCNC
Shibboleth Configuration from 100,000 Feet, in 15 Minutes or Less! Steve Thorpe Systems Programmer / Analyst MCNC Helpful Skill Sets Include Basic Knowledge Of: Your OS: Linux or Windows Experience using
S P I E Information Environments Shibboleth and Its Integration into Security Architectures. EDUCAUSE & Internet 2 Security Professionals Conference
Shibboleth and Its Integration into Security Architectures Christian Fernau, Francisco Pinto University of Oxford EDUCAUSE & Internet 2 Security Professionals Conference Denver, CO 10-12 April 2006 16:47:29
Shibboleth User Verification Customer Implementation Guide 2015-03-13 Version 3.5
Shibboleth User Verification Customer Implementation Guide 2015-03-13 Version 3.5 TABLE OF CONTENTS Introduction... 1 Purpose and Target Audience... 1 Commonly Used Terms... 1 Overview of Shibboleth User
Shibboleth Configuration in Tübingen
Shibboleth Configuration in Tübingen Thomas Zastrow Yana Panchenko The university Tübingen is member of the DFN AAI The computing center in Tübingen runs a centralized IDP for the whole university In the
Integrating VMware Horizon Workspace and VMware Horizon View TECHNICAL WHITE PAPER
Integrating VMware Horizon Workspace and VMware Horizon View TECHNICAL WHITE PAPER Table of Contents Introduction.... 3 Requirements.... 3 Horizon Workspace Components.... 3 SAML 2.0 Standard.... 3 Authentication
Identity Server Guide Access Manager 4.0
Identity Server Guide Access Manager 4.0 June 2014 www.netiq.com/documentation Legal Notice THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT ARE FURNISHED UNDER AND ARE SUBJECT TO THE TERMS OF
How to create a SP and a IDP which are visible across tenant space via Config files in IS
How to create a SP and a IDP which are visible across tenant space via Config files in IS This Documentation is explaining the way to create a SP and IDP which works are visible to all the tenant domains.
GlobalSign Enterprise Solutions Google Apps Authentication User Guide
GlobalSign Enterprise Solutions Google Apps Authentication User Guide Using EPKI for Google Apps for Business Single Sign-on and Secure Document Sharing v.1.1 1 Table of Contents Table of Contents... 2
Access Gateway Guide Access Manager 4.0 SP1
Access Gateway Guide Access Manager 4.0 SP1 May 2014 www.netiq.com/documentation Legal Notice THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT ARE FURNISHED UNDER AND ARE SUBJECT TO THE TERMS
Federated Identity Management Solutions
Federated Identity Management Solutions Jyri Kallela Helsinki University of Technology [email protected] Abstract Federated identity management allows users to access multiple services based on a single
Federated Identity Management
Federated Identity Management SWITCHaai Team [email protected] Agenda 2 What is Federated Identity Management? What is a Federation? The SWITCHaai Federation Interfederation Evolution of Identity Management
Configuring EPM System 11.1.2.1 for SAML2-based Federation Services SSO
Configuring EPM System 11.1.2.1 for SAML2-based Federation Services SSO Scope... 2 Prerequisites Tasks... 2 Procedure... 2 Step 1: Configure EPM s WebLogic domain for SP Federation Services... 2 Step 2:
OpenSSO: Simplify Your Single-Sign-On Needs. Sang Shin Java Technology Architect Sun Microsystems, inc. javapassion.com
OpenSSO: Simplify Your Single-Sign-On Needs Sang Shin Java Technology Architect Sun Microsystems, inc. javapassion.com 1 Agenda Enterprise security needs What is OpenSSO? OpenSSO features > > > > SSO and
Single Sign On. SSO & ID Management for Web and Mobile Applications
Single Sign On and ID Management Single Sign On SSO & ID Management for Web and Mobile Applications Presenter: Manish Harsh Program Manager for Developer Marketing Platforms of NVIDIA (Visual Computing
CA Performance Center
CA Performance Center Single Sign-On User Guide 2.4 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation ) is
SSO Plugin. Release notes. J System Solutions. http://www.javasystemsolutions.com Version 3.6
SSO Plugin Release notes J System Solutions Version 3.6 JSS SSO Plugin v3.6 Release notes What's new... 3 Improved Integrated Windows Authentication... 3 BMC ITSM self service... 3 Improved BMC ITSM Incident
Single Sign-On for the UQ Web
Single Sign-On for the UQ Web David Gwynne Infrastructure Architect, ITIG, EAIT Taxonomy Authentication - Verification that someone is who they claim to be - ie, only the relevant user
Federations 101. An Introduction to Federated Identity Management. Peter Gietz, Martin Haase
Authentication and Authorisation for Research and Collaboration Federations 101 An Introduction to Federated Identity Management Peter Gietz, Martin Haase AARC NA2 Task 2 - Outreach and Dissemination DAASI
PingFederate. SSO Integration Overview
PingFederate SSO Integration Overview 2006-2012 Ping Identity Corporation. All rights reserved. PingFederate SSO Integration Overview Version 6.6 January, 2012 Ping Identity Corporation 1001 17th Street,
Configuration Worksheets for Oracle WebCenter Ensemble 10.3
Configuration Worksheets for Oracle WebCenter Ensemble 10.3 This document contains worksheets for installing and configuring Oracle WebCenter Ensemble 10.3. Print this document and use it to gather the
Novell Access Manager
Novell Access Manager Product Overview Kiran Mova Agenda Introduction Architecture IDP AG SSL VPN Administration Console How it works? Web SSO Federation SSO Protect HTTP Resources Protect non-http Resources
Evaluation of different Open Source Identity management Systems
Evaluation of different Open Source Identity management Systems Ghasan Bhatti, Syed Yasir Imtiaz Linkoping s universitetet, Sweden [ghabh683, syeim642]@student.liu.se 1. Abstract Identity management systems
Configuration Guide BES12. Version 12.3
Configuration Guide BES12 Version 12.3 Published: 2016-01-19 SWD-20160119132230232 Contents About this guide... 7 Getting started... 8 Configuring BES12 for the first time...8 Configuration tasks for managing
Shibboleth 2: A Guide for Deployers. Scott Cantor [email protected] Internet2 / The Ohio State University
Shibboleth 2: A Guide for Deployers Scott Cantor [email protected] Internet2 / The Ohio State University Outline Introduction to Shibboleth and Related Topics Software Architecture Deploying an Identity
IMPLEMENTING SINGLE SIGN- ON USING SAML 2.0 ON JUNIPER NETWORKS MAG SERIES JUNOS PULSE GATEWAYS
APPLICATION NOTE IMPLEMENTING SINGLE SIGN- ON USING SAML 2.0 ON JUNIPER NETWORKS MAG SERIES JUNOS PULSE GATEWAYS SAML 2.0 combines encryption and digital signature verification across resources for a more
How To Use Netiq Access Manager 4.0.1.1 (Netiq) On A Pc Or Mac Or Macbook Or Macode (For Pc Or Ipad) On Your Computer Or Ipa (For Mac) On An Ip
Setup Guide Access Manager 4.0 SP1 May 2014 www.netiq.com/documentation Legal Notice THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT ARE FURNISHED UNDER AND ARE SUBJECT TO THE TERMS OF A LICENSE
OpenAM. 1 open source 1 community experience distilled. Single Sign-On (SSO) tool for securing your web. applications in a fast and easy way
OpenAM Written and tested with OpenAM Snapshot 9 the Single Sign-On (SSO) tool for securing your web applications in a fast and easy way Indira Thangasamy [ PUBLISHING 1 open source 1 community experience
Dell One Identity Cloud Access Manager 8.0.1 - How to Configure for SSO to SAP NetWeaver using SAML 2.0
Dell One Identity Cloud Access Manager 8.0.1 - How to Configure for SSO to SAP NetWeaver using SAML 2.0 May 2015 About this guide Prerequisites and requirements NetWeaver configuration Legal notices About
Using SAML for Single Sign-On in the SOA Software Platform
Using SAML for Single Sign-On in the SOA Software Platform SOA Software Community Manager: Using SAML on the Platform 1 Policy Manager / Community Manager Using SAML for Single Sign-On in the SOA Software
SAML Federated Identity at OASIS
International Telecommunication Union SAML Federated Identity at OASIS Hal Lockhart BEA Systems Geneva, 5 December 2006 SAML and the OASIS SSTC o SAML: Security Assertion Markup Language A framework for
Ameritas Single Sign-On (SSO) and Enterprise SAML Standard. Architectural Implementation, Patterns and Usage Guidelines
Ameritas Single Sign-On (SSO) and Enterprise SAML Standard Architectural Implementation, Patterns and Usage Guidelines 1 Background and Overview... 3 Scope... 3 Glossary of Terms... 4 Architecture Components...
Configuring Single Sign-On from the VMware Identity Manager Service to Office 365
Configuring Single Sign-On from the VMware Identity Manager Service to Office 365 VMware Identity Manager JULY 2015 V1 Table of Contents Overview... 2 Passive and Active Authentication Profiles... 2 Adding
IAM, Enterprise Directories and Shibboleth (oh my!)
IAM, Enterprise Directories and Shibboleth (oh my!) Gary Windham Senior Enterprise Systems Architect University Information Technology Services [email protected] What is IAM? Identity and Access
Federated Identity: Leveraging Shibboleth to Access On and Off Campus Resources
Federated Identity: Leveraging Shibboleth to Access On and Off Campus Resources Paul Riddle University of Maryland Baltimore County EDUCAUSE Mid-Atlantic Regional Conference January 16, 2008 Copyright
OpenLDAP Oracle Enterprise Gateway Integration Guide
An Oracle White Paper June 2011 OpenLDAP Oracle Enterprise Gateway Integration Guide 1 / 29 Disclaimer The following is intended to outline our general product direction. It is intended for information
Xerox DocuShare Security Features. Security White Paper
Xerox DocuShare Security Features Security White Paper Xerox DocuShare Security Features Businesses are increasingly concerned with protecting the security of their networks. Any application added to a
Secure the Web: OpenSSO
Secure the Web: OpenSSO Sang Shin, Technology Architect Sun Microsystems, Inc. javapassion.com Pat Patterson, Principal Engineer Sun Microsystems, Inc. blogs.sun.com/superpat 1 Agenda Need for identity-based
Getting Started with AD/LDAP SSO
Getting Started with AD/LDAP SSO Active Directory and LDAP single sign- on (SSO) with Syncplicity Business Edition accounts allows companies of any size to leverage their existing corporate directories
Session Code*: 0310 Demystifying Authentication and SSO Options in Business Intelligence. Greg Wcislo
Session Code*: 0310 Demystifying Authentication and SSO Options in Business Intelligence Greg Wcislo Introduction We will not go into detailed how-to, however links to multiple how-to whitepapers will
Securing SAS Web Applications with SiteMinder
Configuration Guide Securing SAS Web Applications with SiteMinder Audience Two application servers that SAS Web applications can run on are IBM WebSphere Application Server and Oracle WebLogic Server.
SSO Plugin. Case study: Integrating with Ping Federate. J System Solutions. http://www.javasystemsolutions.com. Version 4.0
SSO Plugin Case study: Integrating with Ping Federate J System Solutions Version 4.0 JSS SSO Plugin v4.0 Release notes Introduction... 3 Ping Federate Service Provider configuration... 4 Assertion Consumer
CA Nimsoft Service Desk
CA Nimsoft Service Desk Single Sign-On Configuration Guide 6.2.6 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation
Installing Apache as an HTTP Proxy to the local port of the Secure Agent s Process Server
Installing Apache as an HTTP Proxy to the local port of the Secure Agent s Process Server Technical Note Dated: 23 June 2015 Page 1 of 8 Overview This document describes how by installing an Apache HTTP
Federated Identity Management. Willem Elbers (MPI-TLA) EUDAT training
Federated Identity Management Willem Elbers (MPI-TLA) EUDAT training Date: 26 June 2012 Outline FIM and introduction to components Federation and metadata National Identity federations and inter federations
How To Use Saml 2.0 Single Sign On With Qualysguard
QualysGuard SAML 2.0 Single Sign-On Technical Brief Introduction Qualys provides its customer the option to use SAML 2.0 Single Sign On (SSO) authentication with their QualysGuard subscription. When implemented,
New Single Sign-on Options for IBM Lotus Notes & Domino. 2012 IBM Corporation
New Single Sign-on Options for IBM Lotus Notes & Domino 2012 IBM Corporation IBM s statements regarding its plans, directions, and intent are subject to change or withdrawal without notice at IBM s sole
STUDY ON IMPROVING WEB SECURITY USING SAML TOKEN
STUDY ON IMPROVING WEB SECURITY USING SAML TOKEN 1 Venkadesh.M M.tech, Dr.A.Chandra Sekar M.E., Ph.d MISTE 2 1 ResearchScholar, Bharath University, Chennai 73, India. [email protected] 2 Professor-CSC
Integrating EJBCA and OpenSSO
Integrating EJBCA and OpenSSO EJBCA is an Enterprise PKI Certificate Authority issuing certificates to users, servers and devices. In an organization certificate can be used for strong authentication.
Single Sign On for ShareFile with NetScaler. Deployment Guide
Single Sign On for ShareFile with NetScaler Deployment Guide This deployment guide focuses on defining the process for enabling Single Sign On into Citrix ShareFile with Citrix NetScaler. Table of Contents
An Advanced Fallback Authentication Framework for SAS 9.4 and SAS Visual Analytics
Paper SAS102-2014 An Advanced Fallback Authentication Framework for SAS 9.4 and SAS Visual Analytics Zhiyong Li, SAS Institute; Mike Roda, SAS Institute ABSTRACT SAS 9.4 and SAS Visual Analytics (VA) support
Centralized Oracle Database Authentication and Authorization in a Directory
Centralized Oracle Database Authentication and Authorization in a Directory Paul Sullivan [email protected] Principal Security Consultant Kevin Moulton [email protected] Senior Manager,
CA Single Sign-On r12.x (CA SiteMinder) Implementation Proven Professional Exam
CA Single Sign-On r12.x (CA SiteMinder) Implementation Proven Professional Exam (CAT-140) Version 1.4 - PROPRIETARY AND CONFIDENTIAL INFORMATION - These educational materials (hereinafter referred to as
Use Enterprise SSO as the Credential Server for Protected Sites
Webthority HOW TO Use Enterprise SSO as the Credential Server for Protected Sites This document describes how to integrate Webthority with Enterprise SSO version 8.0.2 or 8.0.3. Webthority can be configured
How To Manage Identity On A Cloud (Cloud) With A User Id And A Password (Saas)
Integral Federated Identity Management for Cloud Computing Maicon Stihler, Altair Olivo Santin, Arlindo L. Marcon Jr. Graduate Program in Computer Science Pontifical Catholic University of Paraná Curitiba,
